• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

克服长距离量子密钥分发的强度限制

Overcoming Intensity Limits for Long-Distance Quantum Key Distribution.

作者信息

Almosallam Ibrahim

机构信息

Ministry of Communications and Information Technology, Riyadh 12382, Saudi Arabia.

出版信息

Entropy (Basel). 2025 May 27;27(6):568. doi: 10.3390/e27060568.

DOI:10.3390/e27060568
PMID:40566155
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12192187/
Abstract

Quantum Key Distribution (QKD) enables the sharing of cryptographic keys secured by quantum mechanics. The BB84 protocol assumes single-photon sources, but practical systems rely on weak coherent pulses vulnerable to Photon-Number-Splitting (PNS) attacks. The Gottesman-Lo-Lütkenhaus-Preskill (GLLP) framework addresses these imperfections, deriving secure key rate bounds under limited PNS scenarios. The decoy-state protocol further improves performance by refining single-photon yield estimates, but still considers multi-photon states as insecure, thereby limiting intensities and constraining key rate and distance. More recently, finite-key security bounds for decoy-state QKD have been extended to address general attacks, ensuring security against adversaries capable of exploiting arbitrary strategies. In this work, we focus on a specific class of attacks, the generalized PNS attack, and demonstrate that higher pulse intensities can be securely used by employing Bayesian inference to estimate key parameters directly from observed data. By raising the pulse intensity to 10 photons, we achieve a 50-fold increase in key rate and a 62.2% increase in operational range (about 200 km) compared to the decoy-state protocol. Furthermore, we accurately model after-pulsing using a Hidden Markov Model (HMM) and reveal inaccuracies in decoy-state calculations that may produce erroneous key-rate estimates. While this methodology does not address all possible attacks, it provides a new approach to security proofs in QKD by shifting from worst-case assumption analysis to observation-dependent inference, advancing the reach and efficiency of discrete-variable QKD protocols.

摘要

量子密钥分发(QKD)能够实现由量子力学保障安全的加密密钥共享。BB84协议假定使用单光子源,但实际系统依赖于易受光子数分割(PNS)攻击的弱相干脉冲。 Gottesman-Lo-Lütkenhaus-Preskill(GLLP)框架解决了这些缺陷,在有限的PNS场景下推导了安全密钥率界限。诱骗态协议通过完善单光子产率估计进一步提高了性能,但仍将多光子态视为不安全,从而限制了强度并约束了密钥率和距离。最近,诱骗态QKD的有限密钥安全界限已扩展到应对一般攻击,确保抵御能够利用任意策略的对手的安全性。在这项工作中,我们专注于一类特定的攻击,即广义PNS攻击,并证明通过采用贝叶斯推理直接从观测数据估计密钥参数,可以安全地使用更高的脉冲强度。通过将脉冲强度提高到10个光子,与诱骗态协议相比,我们实现了密钥率提高50倍,工作范围增加62.2%(约200公里)。此外,我们使用隐马尔可夫模型(HMM)准确地对后脉冲进行建模,并揭示了诱骗态计算中可能产生错误密钥率估计的不准确之处。虽然这种方法不能应对所有可能的攻击,但它通过从最坏情况假设分析转向依赖观测的推理,为QKD中的安全性证明提供了一种新方法,提高了离散变量QKD协议的覆盖范围和效率。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/e36b839aeca9/entropy-27-00568-g027.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/5c5120ef7e17/entropy-27-00568-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/7d2bfefa62cf/entropy-27-00568-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/66398def39d8/entropy-27-00568-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/d8b524f8d31d/entropy-27-00568-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/5aa79109a40d/entropy-27-00568-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/21c88f2d59cd/entropy-27-00568-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/ff1568e9a915/entropy-27-00568-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/1fecb385c8d8/entropy-27-00568-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/89e8272bbd72/entropy-27-00568-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/c25ab044e1e5/entropy-27-00568-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/e0bb13f82cd6/entropy-27-00568-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/babceeb5c2ec/entropy-27-00568-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/09a03a1f7db3/entropy-27-00568-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/1ce520ce1a9a/entropy-27-00568-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/de1102098bdf/entropy-27-00568-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/33ba7bc32530/entropy-27-00568-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/fa250771aba5/entropy-27-00568-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/137f6cbd90a2/entropy-27-00568-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/70b23b055b86/entropy-27-00568-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/667589b0886d/entropy-27-00568-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/cd9f85f727b6/entropy-27-00568-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/182022ba0ed2/entropy-27-00568-g022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/6cee2569533b/entropy-27-00568-g023.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/33dda20ae6c9/entropy-27-00568-g024.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/cfc6a48a3635/entropy-27-00568-g025.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/1b643b97198d/entropy-27-00568-g026.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/e36b839aeca9/entropy-27-00568-g027.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/5c5120ef7e17/entropy-27-00568-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/7d2bfefa62cf/entropy-27-00568-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/66398def39d8/entropy-27-00568-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/d8b524f8d31d/entropy-27-00568-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/5aa79109a40d/entropy-27-00568-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/21c88f2d59cd/entropy-27-00568-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/ff1568e9a915/entropy-27-00568-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/1fecb385c8d8/entropy-27-00568-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/89e8272bbd72/entropy-27-00568-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/c25ab044e1e5/entropy-27-00568-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/e0bb13f82cd6/entropy-27-00568-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/babceeb5c2ec/entropy-27-00568-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/09a03a1f7db3/entropy-27-00568-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/1ce520ce1a9a/entropy-27-00568-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/de1102098bdf/entropy-27-00568-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/33ba7bc32530/entropy-27-00568-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/fa250771aba5/entropy-27-00568-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/137f6cbd90a2/entropy-27-00568-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/70b23b055b86/entropy-27-00568-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/667589b0886d/entropy-27-00568-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/cd9f85f727b6/entropy-27-00568-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/182022ba0ed2/entropy-27-00568-g022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/6cee2569533b/entropy-27-00568-g023.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/33dda20ae6c9/entropy-27-00568-g024.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/cfc6a48a3635/entropy-27-00568-g025.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/1b643b97198d/entropy-27-00568-g026.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2229/12192187/e36b839aeca9/entropy-27-00568-g027.jpg

相似文献

1
Overcoming Intensity Limits for Long-Distance Quantum Key Distribution.克服长距离量子密钥分发的强度限制
Entropy (Basel). 2025 May 27;27(6):568. doi: 10.3390/e27060568.
2
A rapid and systematic review of the clinical effectiveness and cost-effectiveness of paclitaxel, docetaxel, gemcitabine and vinorelbine in non-small-cell lung cancer.对紫杉醇、多西他赛、吉西他滨和长春瑞滨在非小细胞肺癌中的临床疗效和成本效益进行的快速系统评价。
Health Technol Assess. 2001;5(32):1-195. doi: 10.3310/hta5320.
3
Cost-effectiveness of using prognostic information to select women with breast cancer for adjuvant systemic therapy.利用预后信息为乳腺癌患者选择辅助性全身治疗的成本效益
Health Technol Assess. 2006 Sep;10(34):iii-iv, ix-xi, 1-204. doi: 10.3310/hta10340.
4
The clinical effectiveness and cost-effectiveness of enzyme replacement therapy for Gaucher's disease: a systematic review.戈谢病酶替代疗法的临床疗效和成本效益:一项系统评价。
Health Technol Assess. 2006 Jul;10(24):iii-iv, ix-136. doi: 10.3310/hta10240.
5
Factors that impact on the use of mechanical ventilation weaning protocols in critically ill adults and children: a qualitative evidence-synthesis.影响重症成人和儿童机械通气撤机方案使用的因素:一项定性证据综合分析
Cochrane Database Syst Rev. 2016 Oct 4;10(10):CD011812. doi: 10.1002/14651858.CD011812.pub2.
6
Home treatment for mental health problems: a systematic review.心理健康问题的居家治疗:一项系统综述
Health Technol Assess. 2001;5(15):1-139. doi: 10.3310/hta5150.
7
Intravenous magnesium sulphate and sotalol for prevention of atrial fibrillation after coronary artery bypass surgery: a systematic review and economic evaluation.静脉注射硫酸镁和索他洛尔预防冠状动脉搭桥术后房颤:系统评价与经济学评估
Health Technol Assess. 2008 Jun;12(28):iii-iv, ix-95. doi: 10.3310/hta12280.
8
Assessing the comparative effects of interventions in COPD: a tutorial on network meta-analysis for clinicians.评估慢性阻塞性肺疾病干预措施的比较效果:面向临床医生的网状Meta分析教程
Respir Res. 2024 Dec 21;25(1):438. doi: 10.1186/s12931-024-03056-x.
9
A systematic review and economic evaluation of epoetin alpha, epoetin beta and darbepoetin alpha in anaemia associated with cancer, especially that attributable to cancer treatment.促红细胞生成素α、促红细胞生成素β和达比加群酯治疗癌症相关性贫血(尤其是癌症治疗所致贫血)的系统评价与经济学评估
Health Technol Assess. 2007 Apr;11(13):1-202, iii-iv. doi: 10.3310/hta11130.
10
Drugs for preventing postoperative nausea and vomiting in adults after general anaesthesia: a network meta-analysis.成人全身麻醉后预防术后恶心呕吐的药物:网状Meta分析
Cochrane Database Syst Rev. 2020 Oct 19;10(10):CD012859. doi: 10.1002/14651858.CD012859.pub2.

本文引用的文献

1
Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.在不使用量子中继器的情况下突破量子密钥分发的速率-距离限制。
Nature. 2018 May;557(7705):400-403. doi: 10.1038/s41586-018-0066-6. Epub 2018 May 2.
2
Stochastic relaxation, gibbs distributions, and the bayesian restoration of images.随机松弛,吉布斯分布,以及贝叶斯图像恢复。
IEEE Trans Pattern Anal Mach Intell. 1984 Jun;6(6):721-41. doi: 10.1109/tpami.1984.4767596.
3
Experimental quantum key distribution with decoy states.基于诱骗态的实验量子密钥分发
Phys Rev Lett. 2006 Feb 24;96(7):070502. doi: 10.1103/PhysRevLett.96.070502. Epub 2006 Feb 22.
4
Decoy state quantum key distribution.诱骗态量子密钥分发
Phys Rev Lett. 2005 Jun 17;94(23):230504. doi: 10.1103/PhysRevLett.94.230504. Epub 2005 Jun 16.
5
Beating the photon-number-splitting attack in practical quantum cryptography.在实际量子密码学中抵御光子数分裂攻击。
Phys Rev Lett. 2005 Jun 17;94(23):230503. doi: 10.1103/PhysRevLett.94.230503. Epub 2005 Jun 16.
6
Quantum key distribution with high loss: toward global secure communication.高损耗下的量子密钥分发:迈向全球安全通信
Phys Rev Lett. 2003 Aug 1;91(5):057901. doi: 10.1103/PhysRevLett.91.057901.
7
Simple proof of security of the BB84 quantum key distribution protocol.BB84量子密钥分发协议安全性的简单证明。
Phys Rev Lett. 2000 Jul 10;85(2):441-4. doi: 10.1103/PhysRevLett.85.441.
8
Quantum cryptography with coherent states.基于相干态的量子密码学。
Phys Rev A. 1995 Mar;51(3):1863-1869. doi: 10.1103/physreva.51.1863.